From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Coverless Information Hiding Method Based on the Chinese Mathematical Expression., , , , и . ICCCS, том 9483 из Lecture Notes in Computer Science, стр. 133-143. Springer, (2015)A novel signature based on the combination of global and local signatures for image copy detection., , , , и . Secur. Commun. Networks, 7 (11): 1702-1711 (2014)Pseudo 2D String Matching Technique for High Efficiency Screen Content Coding., , , , и . IEEE Trans. Multim., 18 (3): 339-350 (2016)A Survey of DeFi Security: Challenges and Opportunities., , , , , и . CoRR, (2022)A separable reversible data hiding scheme in encrypted image for two cloud servers., и . Int. J. Embed. Syst., 12 (1): 62-71 (2020)Multi-Scale Context-Guided Deep Network for Automated Lesion Segmentation With Endoscopy Images of Gastrointestinal Tract., , , , , , , и . IEEE J. Biomed. Health Informatics, 25 (2): 514-525 (2021)Security Analysis of DeFi: Vulnerabilities, Attacks and Advances., , , и . Blockchain, стр. 488-493. IEEE, (2022)Arbitrary shape matching for screen content coding., , , и . PCS, стр. 369-372. IEEE, (2013)Pseudo-2D-matching based dual-coder architecture for screen contents coding., , и . ICME Workshops, стр. 1-4. IEEE Computer Society, (2013)An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS., , и . KSII Trans. Internet Inf. Syst., 15 (4): 1553-1567 (2021)